讓 Debian 可以將「掛」上來的 storage 給其他 user 使用

Ubuntu 22 的時候,外部的 storage (以及 encrypted disk) 會被掛在 /media/$USER/$DISKNAME 這邊,但換到了 Debian 後,系統會掛到 /run/media/$USER/$DISKNAME,而且 /run/media/$USER 目錄會是 700。 於是 virt-manager 就讀不到我放在其他加密硬碟上的檔案了。 問了 LLM 給了一個解法: ENV{ID_FS_USAGE}==filesystem, ENV{UDISKS_FILESYSTEM_SHARED}=1 然後順藤摸瓜可以在 udisks 這邊可以看到說明,這樣就會掛到 /media/$DISKNAME 了,比之前 Ubuntu 下更乾淨一些?...

Gea-Suan Lin's BLOG

Still catching up with older writeups… Loved this one by @qualys

CVE-2025-6018: #LPE from unprivileged to allow_active in *SUSE 15's #PAM
CVE-2025-6019: #LPE from allow_active to root in #libblockdev via #udisks

https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt

1/3
Va el feedback de esta encuesta! Gracias a todos por participar!! 🙌

La respuesta correcta era: /media

En la mayoría de las distros el directorio por defecto para montar dispositivos extraibles es /media, aunque en muchas distros modernas se usa /run/media (no era una opción en la encuesta para no complicarla mucho).

El mountpoint predeterminado depende de varios factores, entre ellos:

* La versión de udisks que estemos usando: #udisks suele montar en /media, #udisks2 en /run/media).

👇

New Linux udisks flaw lets attackers get root on major Linux distros

Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions.

BleepingComputer

I have always had the feeling that PAM is not being looked at as closely as it should be, as well as other parts of Linux.

Also people "Linux Hardening" everyone should be doing it, as it can sometimes help.

#CyberSecurityNews #Linux #UDisks #PAM #PluggableAuthenticationModules

https://thehackernews.com/2025/06/new-linux-flaws-enable-full-root-access.html

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

Linux systems face critical local privilege escalation threats via CVE-2025-6018/6019 flaws—users must patch now.

The Hacker News

New Linux #udisks flaw lets attackers get root on major Linux distros

Root access enables agent tampering, persistence, and lateral movement, so one unpatched server endangers the whole fleet. Patch both #PAM and libblockdev/udisks everywhere to eliminate this path...

https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/

#infosec #vulnerability #linux

New Linux udisks flaw lets attackers get root on major Linux distros

Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions.

BleepingComputer
Vulnerabilità PAM e udisks portano a root sulle distro Linux

Una catena di exploit permette l'accesso root con gli strumenti PAM e udisks: un utente remoto può ingannare il sistema e ottenere controllo completo su Linux.

Gomoot : tecnologia e lifestyle Scopri le ultime novità in fatto di hardware, tecnologia IA e altro

Released a new version of my cli disk mounter, om.

Nothing big, mostly I've been polishing the code and doing small incremental improvements:

Ui:
- disallow empty passphrase (until we figure out keyfiles at least)
- display errors in red
- eliminate unnecessary linebreaks on unmounted filesystems

Refactorings:
- drop anyhow, define explicit errors with thiserror
- handle and report most errors inside ui
- reimplement `um` alias by preprocessing argv; this will allow flags that require or conflict with `-u` in the future

Packaging:
- nixpkgs: track nixos-24.11 by default

https://codeberg.org/undltd/om

#Rust #NixOS #UDisks #Cli

om

A command line tool to conveniently mount, unmount, (un)lock and safely power off storage devices on Linux with as few keystrokes as possible.

Codeberg.org

Yay, I just published a new opensource project! It is a small program I wrote to solve an inconvenience I experienced with my computer use:

Mounting & unmounting removable devices from command line (on Linux).

Whatever DE I use, I tend to work mostly with the keyboard. So I wanted a short command that would do this for me with as little typing and interaction as possible.

That includes mounting / unmounting at the right place, unlocking / locking encrypted volumes, as well as doing anything necessary to safely remove the device (powering off when supported, locking encrypted volumes after unmount, unmounting other partitions on the same device if present, etc).

It uses UDisks as its backend (but multiple backends can be implemented if desired).

Before I wrote this tool, I was using `bashmount`, which provided inspiration, but I wanted something a bit more ergonomic for my day to day use.

Some of you may have voted in a poll I did a long time ago for choosing its name😉

Hence:

https://codeberg.org/undltd/om

I decided to release it early, as soon as I started using it myself and felt it does the job. If circumstances permit, I'll be able to add niceties and further smooth out the UX, maybe even add features (see the Roadmap for ideas I have at the moment), but I hope it won't become "big and professional" 😉 Maybe I can port it to *BSD at some point🤔

Also, this is my first "real" program in Rust.

Enjoy!

(P.S. This program was written during and despite russian war.)

#Rust #Linux #UDisks #DBus #zbus

om

A command line tool to conveniently mount, unmount, (un)lock and safely power off storage devices on Linux with as few keystrokes as possible.

Codeberg.org
I've finally released a project I've been working on for the last few months, an unofficial #Rust port of the #udisks client library, which helps to access and manipulate storage devices.
Since there is already an (unmaintained) udisks crate, it has been released as udisks2 (https://crates.io/crates/udisks2).
crates.io: Rust Package Registry